Vulnerability Description
A container privilege escalation flaw was found in certain Multi-Cloud Object Gateway Core images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2025-8766
- https://bugzilla.redhat.com/show_bug.cgi?id=2387265
FAQ
What is CVE-2025-8766?
CVE-2025-8766 is a vulnerability with a CVSS score of 6.4 (MEDIUM). A container privilege escalation flaw was found in certain Multi-Cloud Object Gateway Core images. This issue stems from the /etc/passwd file being created with group-writable permissions during build...
How severe is CVE-2025-8766?
CVE-2025-8766 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-8766?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.